Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 13:49
Behavioral task
behavioral1
Sample
36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe
Resource
win7-20240903-en
General
-
Target
36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe
-
Size
331KB
-
MD5
a77e24c20018b1ab66b58aa944c5de9c
-
SHA1
154763d2824785ac6e3167ecc4cd74ebe457c8ef
-
SHA256
36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3
-
SHA512
10b0ee9b0378525cb0a23637a08c6b548009c11c12b7123302e514fd180734fcfb35454dabfd9042f35348983f07600e5bcf211e2f019d9b358159124a0fcd30
-
SSDEEP
3072:NdXi+V5Kgxpdxj8gbib20xTyst542t8ZHWBow8+zoB91wDQgJl0x2AEMenKbZisd:Nd7rpL43btmQ58Z27zw39gY2FeZh4w
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\fonyk.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exetalua.exemodoic.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation talua.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation modoic.exe -
Executes dropped EXE 3 IoCs
Processes:
talua.exemodoic.exefonyk.exepid process 3612 talua.exe 948 modoic.exe 2536 fonyk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
talua.execmd.exemodoic.exefonyk.execmd.exe36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language talua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language modoic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fonyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fonyk.exepid process 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe 2536 fonyk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exetalua.exemodoic.exedescription pid process target process PID 1448 wrote to memory of 3612 1448 36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe talua.exe PID 1448 wrote to memory of 3612 1448 36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe talua.exe PID 1448 wrote to memory of 3612 1448 36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe talua.exe PID 1448 wrote to memory of 1104 1448 36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe cmd.exe PID 1448 wrote to memory of 1104 1448 36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe cmd.exe PID 1448 wrote to memory of 1104 1448 36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe cmd.exe PID 3612 wrote to memory of 948 3612 talua.exe modoic.exe PID 3612 wrote to memory of 948 3612 talua.exe modoic.exe PID 3612 wrote to memory of 948 3612 talua.exe modoic.exe PID 948 wrote to memory of 2536 948 modoic.exe fonyk.exe PID 948 wrote to memory of 2536 948 modoic.exe fonyk.exe PID 948 wrote to memory of 2536 948 modoic.exe fonyk.exe PID 948 wrote to memory of 4716 948 modoic.exe cmd.exe PID 948 wrote to memory of 4716 948 modoic.exe cmd.exe PID 948 wrote to memory of 4716 948 modoic.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe"C:\Users\Admin\AppData\Local\Temp\36d7e058cf340be06eedf13fa2180bdc4b570a5166113096825352a3d67d38c3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\talua.exe"C:\Users\Admin\AppData\Local\Temp\talua.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\modoic.exe"C:\Users\Admin\AppData\Local\Temp\modoic.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\fonyk.exe"C:\Users\Admin\AppData\Local\Temp\fonyk.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4716
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5913e3ad0783d12e1678c085235cd0e09
SHA1f28b28def55c12fa3167bf5c275e346dcd50407e
SHA2563250f978a639914589d3f8f35e931b7ae7a9fe9a7838b3314eccf4399b0af7ee
SHA51269f576fc4888955142a3e7f195da7deda2bf80d65fc548486dad367da31679674710cd263d90d709798dae7802cc244b82a85894afa72d1ef53a39aac7e8ddbd
-
Filesize
340B
MD54af5ce80e4190625e8325667743a9939
SHA18ffa27c1fb739f081671d7dd1b3ce76b4a965049
SHA2569123c988cf2e0216092aef20db377731649c28dd50dc116041dad06df741ca70
SHA512e2347bfdac92a02539098c44c90d35ae6c885b7b3ad219dcc802d73f12ace5599df111dd003aed534373f8b012f92c705ca10f74f4ef87710235909736ca9fcf
-
Filesize
136KB
MD57a89394d0f36d4a6590d8632829824e5
SHA121f730d0fa4252c1c414facf6902d377dc1c568e
SHA256e942862d7a974fb012b190773a967a802bbe6ea99212ee83e44676716462d488
SHA5129bd30596500ec37400ed55a4a7a9d756da87e96eadb01be4a1085dd90df3fd903c187b70debfd9e87c5be88e8b6873e6517863b9f32a040422d21260ff50b567
-
Filesize
512B
MD5c2b21075b9b8a317ceab025b9a142aaa
SHA103ac5efb73cd8d17505ccba1336b28e38f928a63
SHA256d491520676f8a954e1c11f9a5723c0dbe3ed2d09885578b300df9d0c8c141668
SHA51230247f810bddaed98a2fb658c489ac9e09a054c99d15484b4a78aa697111f6c6700c70fe72adf3e5027962d087e4a38d920f95d81cd0ed45552726bb9d948e52
-
Filesize
331KB
MD5a1846a047cc3e9475bb501b1d486279f
SHA1b67d1a39a6070ea4d071e09b6cd22aa9db1f4941
SHA25627fd41c8978267c9430fa38665e46a5d3ca0d8a9a4138cec8a3122fd4332190c
SHA51239d874395e6709ae8b0ad111cacf99311cf6e6d212132665f0507dd1b9f45d11bb9dfc0a0b02119882f0ed7c2cb4122aa1990f412824dbb31f195aa8e46f9ced